White Papers/Reports

White Papers/Reports

Zoom Bombings Part One: What They Are and How to Avoid Them

Zoom, a video conference application, has become a heavily used communication tool as people across the world are being told to stay at home to prevent the spread of the coronavirus.

Unfortunately, with the increased activity, Zoom has become one of many targeted applications as hackers seek to take advantage of people migrating to virtual environments due to the coronavirus. Luckily, there is security readily available for us to utilize when hosting a Zoom meeting to help prevent being a victim of Zoom-bombing.

To read more about the general use of Zoom and security tips and features that can be used when a Host sets up a meeting download the free white paper.

Zoom Bombings Part One: What They Are and How to Avoid Them

Name*

Title*

Company*

Email*

Phone

This field is for validation purposes and should be left unchanged.

UNDER ATTACK: The Global Year in Breach

2019 was an interesting year for cybersecurity. Even though we have started to see data privacy laws go into place, the past year still saw the average cost and size of security breaches increase worldwide. As companies rush to integrate new technologies, they also increase possible security threats. In the last two year alone, the likelihood of experiencing a data breach has increased by 31%. The U.S. specifically saw more and more cybercrime directed at small businesses.

To read more about 2019’s cybersecurity landscape and predictions for 2020 download the free white paper.